| Time & API |
Arguments |
Status |
Return |
Repeated |
1619616252.508375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
1507328
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00700000
|
success
|
0 |
0
|
1619616252.508375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00830000
|
success
|
0 |
0
|
1619616253.024375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
1703936
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00c00000
|
success
|
0 |
0
|
1619616253.024375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00d60000
|
success
|
0 |
0
|
1619616253.071375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x73b91000
|
success
|
0 |
0
|
1619616253.149375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
1441792
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00c00000
|
success
|
0 |
0
|
1619616253.149375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00d20000
|
success
|
0 |
0
|
1619616253.164375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0042a000
|
success
|
0 |
0
|
1619616253.164375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
8192
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x73b92000
|
success
|
0 |
0
|
1619616253.164375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00422000
|
success
|
0 |
0
|
1619616253.414375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00532000
|
success
|
0 |
0
|
1619616253.508375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00555000
|
success
|
0 |
0
|
1619616253.524375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0055b000
|
success
|
0 |
0
|
1619616253.524375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00557000
|
success
|
0 |
0
|
1619616253.680375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00533000
|
success
|
0 |
0
|
1619616253.696375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0053c000
|
success
|
0 |
0
|
1619616253.774375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c0000
|
success
|
0 |
0
|
1619616253.789375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c1000
|
success
|
0 |
0
|
1619616253.821375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
135168
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012c2000
|
success
|
0 |
0
|
1619616253.836375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00534000
|
success
|
0 |
0
|
1619616253.836375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c2000
|
success
|
0 |
0
|
1619616253.852375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c3000
|
success
|
0 |
0
|
1619616253.852375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c4000
|
success
|
0 |
0
|
1619616253.899375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c5000
|
success
|
0 |
0
|
1619616253.899375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c6000
|
success
|
0 |
0
|
1619616253.961375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00535000
|
success
|
0 |
0
|
1619616255.477375
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
12288
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006c7000
|
success
|
0 |
0
|
1619616255.477375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.477375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.477375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012c0000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012c0000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012c0000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012c0000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012c0000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|
1619616255.571375
NtProtectVirtualMemory
|
process_identifier:
1916
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x012e4000
|
success
|
0 |
0
|